By the end of this week, one of the most pivotal initiatives in the field of cybersecurity—the...
cybersecurity
A critical security vulnerability has been discovered in Apache Roller, an open-source Java-based blogging server. This flaw...
Artificial intelligence has become the latest weapon in the arsenal of fraudsters targeting unsuspecting taxpayers amid the...
The European Commission has begun issuing “disposable” laptops and mobile phones to officials traveling to the United...
Cybersecurity researchers at Morphisec have uncovered a new remote access trojan named ResolverRAT, currently being actively deployed...
Chinese authorities have accused the United States National Security Agency (NSA) of conducting sophisticated cyberattacks during the...
The cyber intelligence firm PRODAFT has announced the launch of its SYS initiative, aimed at acquiring user...
A Pakistan-linked hacking group has broadened its campaign against Indian entities, deploying previously undocumented malware strains—CurlBack RAT...
A recent investigation conducted by independent researcher John Tuckner has revealed that dozens of extensions exhibiting suspicious...
Within the United States Cybersecurity and Infrastructure Security Agency (CISA), preparations are reportedly underway for sweeping personnel...
The era of AI-powered code generation tools has not only simplified the lives of developers but also...
TROX Stealer, first identified in December 2024, stands as a striking example of a sophisticated malware campaign...
Hackers are actively exploiting a zero-day vulnerability to compromise secure Gladinet CentreStack file-sharing servers. According to a...
Hackers have begun exploiting a critical vulnerability in the widely used WordPress plugin OttoKit (formerly known as...
Software supply chain attacks are becoming increasingly sophisticated, with malicious actors disguising harmful code as legitimate libraries...